Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records Data breaches have become increasingly common, affecting millions of users across various sectors. One of the latest...
View ArticleIdentity is the New Perimeter: An Infostealer Perspective
Identity is the New Perimeter: An Infostealer Perspective As organizations navigate an increasingly complex IT landscape, traditional security boundaries continue to dissolve. The modern environment...
View ArticleCritical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktops Flaws...
Critical RCE in Ivanti Endpoint Manager, Citrix Virtual Apps & Desktops Flaws – Patch Now Two recent vulnerability disclosures demand swift attention from organizations using Ivanti Endpoint...
View ArticleMajor Cyber Attacks in Review: October 2024
Major Cyber Attacks in Review: October 2024 October 2024 brought a wave of high-profile cyber incidents across various sectors, highlighting the ongoing challenges in digital security. Financial...
View ArticleMicrosoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two...
Microsoft’s November 2024 Patch Tuesday: 89 Vulnerabilities Addressed, Two Active Zero-Day Exploits Microsoft has released its latest security updates with November 2024 Patch Tuesday, addressing a...
View ArticleWhat is Adversarial Threat Emulation and Validation?
What is Adversarial Threat Emulation and Validation? How prepared is your organization to face the same tactics used by the most advanced cyber attackers? Adversarial threat emulation answers this...
View ArticleGoogle’s Cybersecurity Forecast 2025 (Key Insights and Trends for the Year...
Google’s Cybersecurity Forecast 2025 (Key Insights and Trends for the Year Ahead) As 2024 draws to a close, Google Cloud Security’s Cybersecurity Forecast 2025 offers a grounded outlook on the...
View ArticleDark Web Profile: Cadet Blizzard
Dark Web Profile: Cadet Blizzard Cadet Blizzard (DEV-0586) is a Russian GRU-affiliated cyber threat group first tracked by Microsoft in early 2022, following a series of disruptive cyberattacks on...
View ArticleData Tracking on the Dark Web: Leveraging Threat Intelligence for Insights
Data Tracking on the Dark Web: Leveraging Threat Intelligence for Insights Today, when the world is increasingly moving towards digital operation, stolen data circulating on the Dark Web has been a...
View ArticleFord Customer Data Breach, German Statistical Data Leak, and Bank of France...
Ford Customer Data Breach, German Statistical Data Leak, and Bank of France Targeted Recently, SOCRadar’s Dark Web Team has identified an alleged data breach at Ford Motor Company that exposed 44,000...
View ArticleAsia Hacktivist Threat Landscape
Asia Hacktivist Threat Landscape Hacktivism blurs the lines between digital rebellion and activism, as threat actors act for their social and political causes. Far from the traditional protest,...
View ArticleHow Stealer Logs Target E-Commerce Giants During Black Friday
How Stealer Logs Target E-Commerce Giants During Black Friday As the holiday season approaches, Black Friday stands out as one of the busiest shopping days of the year. For consumers, it’s an...
View ArticleExploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0012 and...
Exploited PAN-OS Zero-Days Threaten Thousands of Firewalls (CVE-2024-0012 and CVE-2024-9474) Palo Alto Networks recently disclosed two zero-day vulnerabilities affecting their PAN-OS devices, actively...
View ArticleTop 10 Metrics Every CISO Should Track for Better Security
Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their...
View ArticleApple, Oracle, and Apache Issue Critical Updates for Actively Exploited and...
Apple, Oracle, and Apache Issue Critical Updates for Actively Exploited and High-Risk Vulnerabilities Organizations using Apple, Oracle, and Apache software must act quickly as critical security flaws...
View ArticlePrivilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems;...
Privilege Escalation Risks in ‘needrestart’ Utility Threaten Linux Systems; OSS-Fuzz Finds 26 Hidden Flaws Recent findings have exposed high-severity flaws in the needrestart utility, a key component...
View ArticleHackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks
Hackers Don’t Hack, They Log In – Stealer Logs and Identity Attacks Cyber threat actors are moving beyond traditional methods like exploiting vulnerabilities or brute-forcing passwords. Instead, they...
View ArticleFinancial Software Company Finastra Investigates Recent Security Incident
Financial Software Company Finastra Investigates Recent Security Incident Finastra, a prominent financial services software provider, is currently investigating a cybersecurity incident that has raised...
View ArticleNodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Beyond
NodeStealer’s Evolution: A Growing Threat to Facebook Accounts and Beyond NodeStealer, a Python-based infostealer, has resurfaced in a more dangerous form, raising the stakes for global cybersecurity...
View ArticleDark Web Profile: Moonstone Sleet
Dark Web Profile: Moonstone Sleet Moonstone Sleet AKA Storm-1789, a newly identified North Korean Advanced Persistent Threat (APT) group, has been making waves with its targeted cyberattacks that blend...
View Article